Computer Network Notes Unit 1 Part 2
Computer Network Notes Unit 1 Part 2
o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application
related issues, and they are implemented only in the software. The
application layer is closest to the end user. Both the end user and the
application layer interact with the software applications. An upper layer
refers to the layer just above another layer.
o The lower layer of the OSI model deals with the data transport issues.
The data link layer and the physical layer are implemented in hardware
and software. The physical layer is the lowest layer of the OSI model
and is closest to the physical medium. The physical layer is mainly
responsible for placing the information on the physical medium.
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Physical layer
o Line Configuration: It defines the way how two or more devices can
be connected physically.
o Data Transmission: It defines the transmission mode whether it is
simplex, half-duplex or full-duplex mode between the two devices on
the network.
o Topology: It defines the way how network devices are arranged.
o Signals: It determines the type of the signal used for transmitting the
information.
Data-Link Layer
o Framing: The data link layer translates the physical's raw bit stream
into packets known as Frames. The Data link layer adds the header and
trailer to the frame. The header which is added to the frame contains
the hardware destination and source address.
o Physical Addressing: The Data link layer adds a header to the frame
that contains a destination address. The frame is transmitted to the
destination address mentioned in the header.
o Flow Control: Flow control is the main functionality of the Data-link
layer. It is the technique through which the constant data rate is
maintained on both the sides so that no data get corrupted. It ensures
that the transmitting station such as a server with higher processing
speed does not exceed the receiving station, with lower processing
speed.
o Error Control: Error control is achieved by adding a calculated value
CRC (Cyclic Redundancy Check) that is placed to the Data link layer's
trailer which is added to the message frame before it is sent to the
physical layer. If any error seems to occurr, then the receiver sends the
acknowledgment for the retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to
determine which device has control over the link at a given time.
Network Layer
o It is a layer 3 that manages device addressing, tracks the location of
devices on the network.
o It determines the best path to move data from source to the
destination based on the network conditions, the priority of service,
and other factors.
o The Data link layer is responsible for routing and forwarding the
packets.
o Routers are the layer 3 devices, they are specified in this layer and used
to provide the routing services within an internetwork.
o The protocols used to route the network traffic are known as Network
layer protocols. Examples of protocols are IP and Ipv6.
Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted
in the order in which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data
completely.
o It receives the data from the upper layer and converts them into smaller
units known as segments.
o This layer can be termed as an end-to-end layer as it provides a point-
to-point connection between source and destination to deliver the data
reliably.
Session Layer
Presentation Layer
Application Layer
TCP/IP model
o The TCP/IP model was developed prior to the OSI model.
o The TCP/IP model is not exactly similar to the OSI model.
o The TCP/IP model consists of five layers: the application layer, transport
layer, network layer, data link layer and physical layer.
o The first four layers provide physical standards, network interface,
internetworking, and transport functions that correspond to the first
four layers of the OSI model and these four layers are represented in
TCP/IP model by a single layer called the application layer.
o TCP/IP is a hierarchical protocol made up of interactive modules, and
each of them provides specific functionality.
Internet Layer
IP Protocol: IP protocol is used in this layer, and it is the most significant part
of the entire TCP/IP suite.
ARP Protocol
ICMP Protocol
Transport Layer
The transport layer is responsible for the reliability, flow control, and
correction of data which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol
and Transmission control protocol.
o User Datagram Protocol (UDP)
o It provides connectionless service and end-to-end delivery of
transmission.
o It is an unreliable protocol as it discovers the errors but not
specify the error.
o User Datagram Protocol discovers the error, and ICMP protocol
reports the error to the sender that user datagram has been
damaged.
o UDP consists of the following fields:
Source port address: The source port address is the address of
the application program that has created the message.
Destination port address: The destination port address is the
address of the application program that receives the message.
Total length: It defines the total number of bytes of the user
datagram in bytes.
Checksum: The checksum is a 16-bit field used in error
detection.
o UDP does not specify which packet is lost. UDP contains only
checksum; it does not contain any ID of a data segment.
Application Layer
o HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows
us to access the data over the world wide web. It transfers the data in
the form of plain text, audio, video. It is known as a Hypertext transfer
protocol as it has the efficiency to use in a hypertext environment
where there are rapid jumps from one document to another.
o SNMP: SNMP stands for Simple Network Management Protocol. It is a
framework used for managing the devices on the internet by using the
TCP/IP protocol suite.
o SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP
protocol that supports the e-mail is known as a Simple mail transfer
protocol. This protocol is used to send the data to another e-mail
address.
o DNS: DNS stands for Domain Name System. An IP address is used to
identify the connection of a host to the internet uniquely. But, people
prefer to use the names instead of addresses. Therefore, the system
that maps the name to the address is known as Domain Name System.
o TELNET: It is an abbreviation for Terminal Network. It establishes the
connection between the local computer and remote computer in such
a way that the local terminal appears to be a terminal at the remote
system.
o FTP: FTP stands for File Transfer Protocol. FTP is a standard internet
protocol used for transmitting the files from one computer to another
computer.
Types of Hub
o Active Hub:- These are the hubs that have their own power supply and
can clean, boost, and relay the signal along with the network. It serves
both as a repeater as well as a wiring center. These are used to extend
the maximum distance between nodes.
o Passive Hub:- These are the hubs that collect wiring from nodes and
power supply from the active hub. These hubs relay signals onto the
network without cleaning and boosting them and can’t be used to
extend the distance between nodes.
o Intelligent Hub:- It works like active hubs and includes remote
management capabilities. They also provide flexible data rates to
network devices. It also enables an administrator to monitor the traffic
passing through the hub and to configure each port in the hub.
Types of Bridges
o Transparent Bridges:- These are the bridge in which the stations are
completely unaware of the bridge’s existence i.e. whether or not a
bridge is added or deleted from the network, reconfiguration of the
stations is unnecessary.
o Source Routing Bridges:- In these bridges, routing operation is
performed by the source station and the frame specifies which route to
follow. The host can discover the frame by sending a special frame
called the discovery frame, which spreads through the entire network
using all possible paths to the destination.
o 4. Switch – A switch is a multiport bridge with a buffer and a design
that can boost its efficiency (a large number of ports imply less traffic)
and performance. A switch is a data link layer device. The switch can
perform error checking before forwarding data, which makes it very
efficient as it does not forward packets that have errors and forward
good packets selectively to the correct port only. In other words, the
switch divides the collision domain of hosts, but broadcast
domain remains the same.
o Bandwidth: All the factors are remaining constant, the greater the
bandwidth of a medium, the higher the data transmission rate of a
signal.
o Transmission impairment: When the received signal is not identical to
the transmitted one due to the transmission impairment. The quality of
the signals will get destroyed due to transmission impairment.
o Interference: An Interference is defined as the process of disrupting a
signal when it travels over a communication medium on the addition of
some unwanted signal.
Guided Media
It is defined as the physical medium through which the signals are
transmitted. It is also known as Bounded media.
Twisted pair:
Twisted pair is a physical media made up of a pair of cables twisted with each
other. A twisted pair cable is cheap as compared to other transmission media.
Installation of the twisted pair cable is easy, and it is a lightweight cable. The
frequency range for twisted pair cable is from 0 to 3.5KHz.
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantage:
o The cost of the shielded twisted pair cable is not very high and not very
low.
o An installation of STP is easy.
o It has higher capacity as compared to unshielded twisted pair cable.
o It has a higher attenuation.
o It is shielded that provides the higher data transmission rate.
Disadvantages
Coaxial Cable
o Coaxial cable is very commonly used transmission media, for example,
TV wire is usually a coaxial cable.
o The name of the cable is coaxial as it contains two conductors parallel
to each other.
o It has a higher frequency as compared to Twisted pair cable.
o The inner conductor of the coaxial cable is made up of copper, and the
outer conductor is made up of copper mesh. The middle core is made
up of non-conductive cover that separates the inner conductor from
the outer conductor.
o The middle core is responsible for the data transferring whereas the
copper mesh prevents from the EMI (Electromagnetic interference).
Coaxial cable is of two types:
Fibre Optic
o Fibre optic cable is a cable that uses electrical signals for
communication.
o Fibre optic is a cable that holds the optical fibres coated in plastic that
are used to send the data by pulses of light.
o The plastic coating protects the optical fibres from heat, cold,
electromagnetic interference from other types of wiring.
o Fibre optics provide faster data transmission than copper wires.
Radio waves
o Radio waves are the electromagnetic waves that are transmitted in all
the directions of free space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all
the directions.
o The range in frequencies of radio waves is from 3Khz to 1 khz.
o In the case of radio waves, the sending and receiving antenna are not
aligned, i.e., the wave sent by the sending antenna can be received by
any receiving antenna.
o An example of the radio wave is FM radio.
o A Radio wave is useful for multicasting when there is one sender and
many receivers.
o An FM radio, television, cordless phones are examples of a radio wave.
o Radio transmission is mainly used for wide area networks and mobile
cellular phones.
o Radio waves cover a large area, and they can penetrate the walls.
o Radio transmission provides a higher transmission rate.
Microwaves
o Terrestrial microwave
o Satellite microwave communication.
Characteristics of Microwave:
Advantages Of Microwave:
The satellite accepts the signal that is transmitted from the earth station, and
it amplifies the signal. The amplified signal is retransmitted to another earth
station.
Characteristics of Infrared:
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared waves cannot penetrate the walls. Therefore, the infrared
communication in one room cannot be interrupted by the nearby
rooms.
o An infrared communication provides better security with minimum
interference.
o Infrared communication is unreliable outside the building because the
sun rays will interfere with the infrared waves.
Wired LANs
A local Area Network (LAN) is a data communication network
connecting various terminals or computers within a building or limited
geographical area. The connection among the devices could be wired
or wireless. Ethernet, Token Ring and Wireless LAN using IEEE
802.11 are examples of standard LAN technologies.
• Star Topology
• Bus Topology
• Ring Topology
• Mesh Topology
• Hybrid Topology
• Tree Topology
Ethernet:-
Advantages of Ethernet:
Speed: When compared to a wireless connection, Ethernet provides
significantly more speed. Because Ethernet is a one-to-one
connection, this is the case. As a result, speeds of up to 10 Gigabits
per second (Gbps) or even 100 Gigabits per second (Gbps) are
possible.
Currently, these data rates are defined for operation over optical fibres
and twisted-pair cables:
i) Fast Ethernet
Fast Ethernet refers to an Ethernet network that can transfer data at a
rate of 100 Mbit/s.
Wireless LANs
Introduction to Wireless LAN
Wireless LAN stands for Wireless Local Area Network. It is also called LAWN
(Local Area Wireless Network). WLAN is one in which a mobile user can
connect to a Local Area Network (LAN) through a wireless connection.
The IEEE 802.11 group of standards defines the technologies for wireless
LANs. For path sharing, 802.11 standard uses the Ethernet protocol and
CSMA/CA (carrier sense multiple access with collision avoidance). It also uses
an encryption method i.e. wired equivalent privacy algorithm.
Wireless LANs provide high speed data communication in small areas such as
building or an office. WLANs allow users to move around in a confined area
while they are still connected to the network.
In some instance wireless LAN technology is used to save costs and avoid
laying cable, while in other cases, it is the only option for providing high-
speed internet access to the public. Whatever the reason, wireless solutions
are popping up everywhere.
Examples of WLANs that are available today are NCR's waveLAN and
Motorola's ALTAIR.
Most WLANs are based upon the standard IEEE 802.11 standard or WiFi.
Components of WLANs
The components of WLAN architecture as laid down in IEEE 802.11 are −
Stations (STA) − Stations comprises of all devices and equipment that are
connected to the wireless LAN. Each station has a wireless network interface
controller. A station can be of two types −
Client
Infrastructure BSS
Independent BSS
Types of WLANS
WLANs, as standardized by IEEE 802.11, operates in two basic modes,
infrastructure, and ad hoc mode.
Infrastructure Mode − Mobile devices or clients connect to an access point
(AP) that in turn connects via a bridge to the LAN or Internet. The client
transmits frames to other clients via the AP.
Advantages of WLANs
Disadvantages of WLANs